Research: Publications

Publications on information privacy

Publications are listed in reverse chronological order according to publication date. The publications listed on this page include all my publications from all listed areas of interests.

  • OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2011; BOTES, M.E.; "Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities"; South African Computer Journal; No. 47; pp.47-57; South African Institute of Computer Scientists and Information Technologists; ISSN 1015-7999.

  • REDDY, K.; VENTER, H.S.; 2010; "Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research"; 2010 IEEE Second International Conference on Social Computing; Minneapolis, Minnesota, USA.

  • REDDY, K.; VENTER, H.S.; 2009; “Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model”; The Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009);  Athens, Greece.

  • REDDY, K.; VENTER, H.S., M.S. OLIVIER, I. CURRIE; 2008; “Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy”; Sixth Annual Conference on Privacy, Security and Trust; Fredericton, New Brunswick, Canada.

  • REDDY, K.; VENTER, H.S.; 2007; “Privacy Capability Maturity Models within Telecommunications Organisations”; 10th SATNAC: South African Telecommunication Networks & Applications Conference; Sugar Beach, Mauritius.

  • TILLWICK, H.; NEUMANN, T.; OLIVIER, M.S.; VENTER, H.S.; ELOFF, J.H.P.; 2005; Fifth International Network Conference (INC2005); “Polar: Proxies Collaborating to Achieve Anonymous Web Browsing”; Doryssa Bay, Samos, Greece.

  • VENTER, H.S.; OLIVIER, M.S.; ELOFF, J.H.P.; BOTES, M.E.; 2005; Fifth International Network Conference (INC2005); “Balancing Patient Privacy and Treatment Facility Accountability using a Centralised Pseudonymous HIV/AIDS Database”; Doryssa Bay, Samos, Greece.

  • CROFT, N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks"; Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE SecPerU 2005); Santorini, Greece.

  • KELETA, Y.; COETZEE, M.; ELOFF, J.H.P, VENTER, H.S.; 2005 “Proposing a Secure XACML architecture ensuring privacy and trust”; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • VENTER, H.S.; OLIVIER, M.S.; ELOFF, J.H.P.; 2004; Internet Research: Electronic Networking Applications and Policy; “PIDS: A Privacy Intrusion Detection System”; Vol. 14, No. 5; pp. 360-365; Emerald Group Publishing Limited; ISSN: 1066-2243.

  • VENTER, H.S.; OLIVIER, M. S.; ELOFF, J.H.P.; 2004; International Network Conference; “PIDS: A Privacy Intrusion Detection System”; Plymouth, United Kingdom.

   

   
 
 

Maintained by Hein Venter
Last updated on 2012/01/24 09:42:12 AM